Dumpster diving, social engineering, and Internet searches are some of the activities that take place in the following step of the attacker's methodology
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege
ANS: A
Computer Science & Information Technology
You might also like to view...
________ enable you to define the parts of an image that are important to display
Fill in the blank(s) with correct word
Computer Science & Information Technology
Third-generation computers used vacuum tubes
Indicate whether the statement is true or false
Computer Science & Information Technology